-
Interpret some of the roles played by Video Processing Models in Surveillance and security measures
-
**Is your feature request related to a problem? Please describe.**
High threat models require high security and this issue wants to address it
**Describe the ideal solution**
Providing shasums on an…
-
According to @panositi, the EU project TELEMETRY has a use case that requires some elaboration in the models of software processes and control of router functions. The requirements are:
1. A mechanis…
-
### User Story
As a developer of Metaschema models and developer tooling, I would like a to be able to run `metaschema-cli serve --unsafe-local-only` and be able to load a local development server …
-
As the pytm is really charming in saving threat modeling time. But we have a lot of c4 models in c4plantuml type, it is great to convert them into pytm type. It is reasonable to doing threat modeling …
-
### Describe the purpose of the group in no more than 4-5 sentences
The purpose of the Zero Trust Working Group is to support ASWF projects that need to function in a Zero Trust operating environment…
-
The document mentions that attacks on road signs might not be well motivated from a financial perspective. This may or may not be true, however, an attacker's goals are much more than just financial. …
-
**Describe what problem your feature request solves**
Instead of using github repositories for storage of threat models, I'd like to store them all in an alternative centralized storage mechanism (I …
-
P.L.SHLnSACPmAC.1 models the threat whereby at attacker who can access a remote access service (e.g., SSH) can then also control any process run remotely from the shell using that remote access servic…
-
This includes things like
- storage of private keys
- well-defined threat models for different types of participants (customers, merchants)
- deletion of sensitive data